CVE-2024-57223

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Linksys E7350 routers that allows attackers to execute arbitrary commands on the device. The vulnerability exists in the apcli_wps_gen_pincode function via the ifname parameter. All users of affected Linksys E7350 routers are at risk.

💻 Affected Systems

Products:
  • Linksys E7350
Versions: 1.1.00.032
Operating Systems: Embedded Linux firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router leading to full network access, credential theft, malware deployment, and persistent backdoor installation.

🟠

Likely Case

Router takeover allowing network traffic interception, DNS hijacking, and lateral movement to connected devices.

🟢

If Mitigated

Limited impact if router is behind firewall with restricted WAN access and strong network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN.
🏢 Internal Only: MEDIUM - Attackers could exploit from compromised internal devices or via phishing.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repository contains proof-of-concept. Command injection vulnerabilities are typically easy to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check Linksys support site for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Disable WPS functionality

all

Disable Wi-Fi Protected Setup feature which may reduce attack surface

Restrict admin interface access

all

Limit access to router admin interface to trusted IP addresses only

🧯 If You Can't Patch

  • Replace vulnerable router with updated model
  • Isolate router in separate VLAN with strict firewall rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Administration > Firmware Update

Check Version:

Login to router admin interface and check firmware version

Verify Fix Applied:

Verify firmware version is newer than 1.1.00.032

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts to admin interface
  • Suspicious ifname parameter values in web logs

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Unexpected port scans originating from router

SIEM Query:

source="router_logs" AND ("apcli_wps_gen_pincode" OR "ifname=" AND ("|" OR ";" OR "$" OR "`"))

🔗 References

📤 Share & Export